Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64517: CWE-287: Improper Authentication in trifectatechfoundation sudo-rs

0
Medium
VulnerabilityCVE-2025-64517cvecve-2025-64517cwe-287
Published: Wed Nov 12 2025 (11/12/2025, 22:08:29 UTC)
Source: CVE Database V5
Vendor/Project: trifectatechfoundation
Product: sudo-rs

Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of `sudo`), effectively negating the intended behaviour of the `targetpw` or `rootpw` options. Version 0.2.10 contains a patch for the issue. Versions prior to 0.2.5 are not affected, since they do not offer `Defaults targetpw` or `Defaults rootpw`.

AI-Powered Analysis

AILast updated: 11/19/2025, 23:15:53 UTC

Technical Analysis

The vulnerability CVE-2025-64517 affects sudo-rs, a Rust-based memory-safe implementation of sudo and su. When configured with 'Defaults targetpw' or 'Defaults rootpw', sudo-rs is supposed to require the password of the target or root account for authentication. However, in versions 0.2.5 up to but not including 0.2.10, sudo-rs incorrectly records the invoking user's UID in the authentication timestamp rather than the authenticated target user's UID. This timestamp is used to bypass subsequent authentication prompts within a valid session window. Consequently, a user with high privileges who knows the password of one allowed account can exploit this flaw to run commands as any other account permitted by the sudo policy without needing their passwords. This undermines the security model intended by the 'targetpw' and 'rootpw' options, which are designed to enforce stricter authentication requirements. The flaw does not impact versions before 0.2.5, as these did not support the relevant options, and was fixed in version 0.2.10. The vulnerability requires local access with elevated privileges (PR:H), no user interaction, and has a local attack vector (AV:L). It impacts integrity but not confidentiality or availability. No public exploits have been reported so far.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where sudo-rs is deployed with 'targetpw' or 'rootpw' enabled and where users have elevated privileges to run commands as other users. The flaw could allow privilege escalation or lateral movement within systems by bypassing intended authentication controls, potentially leading to unauthorized command execution under different user contexts. This could compromise system integrity and trust boundaries, especially in critical infrastructure, financial institutions, or government agencies that rely on strict access controls. While the vulnerability does not directly impact confidentiality or availability, the ability to execute commands as other users could facilitate further attacks or data manipulation. The medium severity reflects the need for local privileged access, limiting remote exploitation but still posing a significant risk in multi-user or shared environments common in enterprise Linux deployments across Europe.

Mitigation Recommendations

Organizations should immediately upgrade sudo-rs to version 0.2.10 or later, where the issue is patched. Until upgrading, administrators should consider disabling 'Defaults targetpw' and 'Defaults rootpw' options if feasible, or restrict sudo-rs usage to trusted users only. Implement strict monitoring of sudo usage logs to detect anomalous command executions or unexpected user context switches. Employ multi-factor authentication and strong password policies to reduce the risk of credential compromise. Additionally, review and tighten sudo policies to minimize the number of users with elevated privileges and limit the commands they can execute. Conduct regular audits of sudo configurations and authentication timestamp behaviors. For environments where sudo-rs is critical, consider isolating affected systems or using alternative privilege escalation tools that do not exhibit this vulnerability until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691509abe6b3e50d509f11d4

Added to database: 11/12/2025, 10:26:51 PM

Last enriched: 11/19/2025, 11:15:53 PM

Last updated: 12/28/2025, 6:57:48 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats